Term Rewriting and All That, 1999. ,
Effectiveness of Synthesis in Concolic Deobfuscation, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01241356
Algebraic Simplification, Computer Algebra, pp.11-43, 1982. ,
Deobfuscation and beyond. ZeroNights conference, 2014. ,
Understanding expression simplification, Proceedings of the 2004 international symposium on Symbolic and algebraic computation , ISSAC '04, pp.72-79, 2004. ,
DOI : 10.1145/1005285.1005298
Watermarking, tamper-proofing, and obfuscation - tools for software protection, IEEE Transactions on Software Engineering, vol.28, issue.8, pp.735-746, 2002. ,
DOI : 10.1109/TSE.2002.1027797
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation, 2014. ,
Z3: An Efficient SMT Solver, Proceedings of the Theory and Practice of Software, 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS'08/ETAPS'08, pp.337-340 ,
DOI : 10.1007/978-3-540-78800-3_24
Miasm: Framework de reverse engineering, 2012. ,
Deobfuscation: recovering an OLLVM-protected program. Quarkslab's blog, 2014. http://blog.quarkslab.com/ deobfuscation-recovering-an-ollvm-protected-program ,
System and method providing dependency networks throughout applications for attack resistance, App. PCT, 2012. ,
System and method of interlocking to protect software-mediated program and device behaviors. US Patent App, 2008. ,
System and method for obscuring bit-wise and two's complement integer computations in software. US Patent App, 2005. ,
Rotational Cryptanalysis of ARX, Fast Software Encryption, pp.333-346, 2010. ,
DOI : 10.1007/978-3-642-13858-4_19
A New Class of Invertible Mappings, Cryptographic Hardware and Embedded Systems -CHES 2002, pp.470-483, 2003. ,
DOI : 10.1007/3-540-36400-5_34
Decision Procedures: An Algorithmic Point of View, 2008. ,
DOI : 10.1007/978-3-662-50497-0
Lessons in Electric Circuits IV - Digital, Chap. 7 -Boolean Algebra, 1996. ,
A Proposal for a New Block Encryption Standard, Advances in Cryptology ? EUROCRYPT '90, pp.389-404, 1991. ,
DOI : 10.1007/3-540-46877-3_35
A System for Generating Static Analyzers for Machine Instructions, Proceedings of the Joint European Conferences on Theory and Practice of Software 17th International Conference on Compiler Construction, CC'08/ETAPS'08, pp.36-52, 2008. ,
DOI : 10.1007/978-3-540-78791-4_3
Maplesoft, a division of Waterloo Maple Inc ,
Capturing the Essence of Practical Obfuscation, Proceedings of the 6th International Conference on Information Systems, Technology and Management, ICISTM 2012, pp.451-456, 2012. ,
DOI : 10.1007/978-3-642-29166-1_44
DRM obfuscation versus auxiliary attacks. Recon conference, 2014. ,
Handbook of Graph Grammars and Computing by Graph Transformation, Applications, Languages, and Tools, chapter Term Graph Rewriting, pp.3-61, 1999. ,
Using The Gnu Compiler Collection: A Gnu Manual For Gcc Version 4.3.3. CreateSpace, 2009. ,
Triton: A dynamic symbolic execution framework In Symposium sur la sécurité des technologies de l'information et des communications, pp.31-54, 2015. ,
Digital Algebra and Circuits, Theory and Practice, pp.733-746, 2003. ,
DOI : 10.1007/978-3-540-39910-0_31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.96.2652
Hacker's Delight, 2002. ,
The Complexity of Boolean Functions, 1987. ,
Diversity Via Code Transformations: A Solution For NGNA Renewable Security The NCTA Technical Papers, 2006. ,
Information Hiding in Software with Mixed Boolean-Arithmetic Transforms, 8th International Workshop in Information Security Applications (WISA'07), pp.61-75, 2007. ,
DOI : 10.1007/978-3-540-77535-5_5